By now we’ve all heard about the latest cyber-attack. JPMorgan Chase, along with approximately nine unnamed financial institutions, was the latest victim targeted by a group of overseas hackers. By roaming undetected through the banks’ digital networks, the hackers accessed the names, addresses, phone numbers and email addresses of more than 83 million households and […]

With DDoS (Distributed Denial of Service) attacks occurring at a greater frequency and with a higher level of sophistication, companies are ratcheting up their knowledge of what they are, how they occur and how they can defend against them. In our recent webinar, The Ultimate DDoS Info Session, HOSTING teamed up with DOSarrest to provide […]

Healthcare organizations are questioning whether their workflows and EHR systems are delivering on the promise of protecting patient data. Learn the factors behind the data risks and how implementing a compliant cloud solution can help maintain patient data integrity.

In my June 30th post entitled The High Cost of HIPAA Violations, I referred to the recent IT security breach by Concentra Health Services in which they agreed to pay $1,725,220 in fines after a single unencrypted laptop was stolen from one of its facilities. Far from being an isolated incident, healthcare companies are struggling to align HIPAA compliance regulations with […]

One of the hot topics discussed at HOSTING’s headquarters today was eBay’s recent data breach. According to eBay’s press release: The database, which was compromised between late February and early March, included eBay customers’ name, encrypted password, email address, physical address, phone number and date of birth. However, the database did not contain financial information […]

CIO magazine published How IT Can Establish Better Cloud Control, an insightful and instructive article about establishing better control of how employees use cloud computing services and, in particular, software as a service (SaaS) applications. Backed by some cold, hard facts from a study of 1,000 full-time employees that reports the careless – though not […]

As CTO, I spend my days (largely) on two things: technology and the customer. So what I hear from our market on topics such as security is of paramount importance in driving HOSTING’s delivery strategy. However, while we certainly offer an array of security components and solutions, such as cloud firewall, threat and log management, […]

Every month, our customer support teams handle around 400 requests from customers to make changes to or ask questions about their firewall configuration. The process is time consuming and usually involves multiple interactions between our customers and us to confirm that the changes had the desired impact. In short, not the greatest customer experience. Especially since […]

While at HOSTING we are known for supporting mission-critical applications in the cloud, we still host plenty of actual web sites at our facilities, as well. You may or may not want to know what’s wrong with the underpinnings of your site, but JIC… here’s what your CIO just won’t tell you. 1. Your […]